last executing test programs: 23.859617642s ago: executing program 0 (id=2848): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() setrlimit(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000840)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x2a, 0x2, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[], 0x90}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r5 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) 15.743413419s ago: executing program 0 (id=2862): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca0000c441f96ec80fc4c60066400fe2def3ad46c7045300101000f00fc01ec422e10399c5c1202066410f6f15040000000000e1f563df", 0xdc000006, 0x0}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @dev={0xac, 0x14, 0x14, 0x12}, 0x0, 0x0, 'dh\x00'}, 0x2c) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000001540)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00220f"], 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000040)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12.799380912s ago: executing program 0 (id=2866): r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000600)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @empty}, 0x0, {[0x0, 0xb5f]}}, 0x5c) setsockopt$MRT6_ADD_MFC_PROXY(r0, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @empty}}, 0x5c) 12.088183706s ago: executing program 0 (id=2869): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x5}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x301, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x68}, 0x1, 0x0, 0x0, 0x5d04b4753047a371}, 0x40000) 11.665451716s ago: executing program 0 (id=2870): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000440)={0x30, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x30}}, 0x0) 11.296489265s ago: executing program 0 (id=2871): prlimit64(0x0, 0x6, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setrlimit(0x4, &(0x7f0000000040)={0x6, 0x10000}) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(r0, 0x0, 0x0) r1 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) ioctl$I2C_PEC(r1, 0x708, 0x8000) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) readv(r2, &(0x7f0000000600), 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x6) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) r5 = syz_open_pts(r4, 0x141601) fcntl$setstatus(r5, 0x4, 0x102800) write(r5, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x3) close_range(r3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r8, &(0x7f00000001c0)='O', 0x1, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @private2}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) 2.43926674s ago: executing program 1 (id=2876): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001200)=@newtaction={0x60, 0x30, 0x1, 0x80000000, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x8000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x0) 2.023670789s ago: executing program 1 (id=2877): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000b70000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000000f8c0000001c0a01080000000000000000010000000900020073797a3200000000600003805c000080080003400000000250000b80200001800a00010071756f7461000000100002800c0001400000000000000000140001800c000100636f756e7465720004000280180001801100"], 0x110}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, 0x41, 0x107, 0x0, 0x0, {0x1, 0x7c}, [@nested={0x8, 0x4, 0x0, 0x1, [@generic='\nN']}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 1.681842343s ago: executing program 1 (id=2878): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x30, 0x24, 0x6c846d5b3dfaa9fb, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x4}}]}, 0x30}}, 0x0) 1.407205535s ago: executing program 1 (id=2879): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0xb, 0x8, 0x40, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000480), 0x1000, r0}, 0x38) 394.498595ms ago: executing program 1 (id=2880): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000020850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 0s ago: executing program 1 (id=2881): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x3eae, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) mkdir(&(0x7f0000000040)='./file0\x00', 0x140) mount(&(0x7f0000000140)=@md0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='xfs\x00', 0x85, 0x0) mlock(&(0x7f00004ef000/0x4000)=nil, 0x4000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x80000) futex(0x0, 0x109, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, 0x39, 0x107, 0x0, 0x0, {0x4, 0x7c}, [@typed={0x4}, @nested={0x4, 0x5}]}, 0x1c}}, 0x0) kernel console output (not intermixed with test programs): =9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2646.717576][ T31] audit: type=1400 audit(2646.650:23906): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2646.718384][ T31] audit: type=1400 audit(2646.650:23907): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2646.790552][ T31] audit: type=1400 audit(2646.720:23908): avc: denied { ioctl } for pid=14445 comm="syz.1.2474" path="socket:[28596]" dev="sockfs" ino=28596 ioctlcmd=0x7213 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2647.205856][ T31] audit: type=1400 audit(2647.140:23909): avc: denied { setopt } for pid=14435 comm="syz.0.2471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2647.221372][ T31] audit: type=1400 audit(2647.150:23910): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2647.222804][ T31] audit: type=1400 audit(2647.160:23911): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2649.336565][T14463] fuse: Bad value for 'fd' [ 2651.747315][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 2651.747433][ T31] audit: type=1400 audit(2651.680:24010): avc: denied { ioctl } for pid=14468 comm="syz.0.2480" path="socket:[28630]" dev="sockfs" ino=28630 ioctlcmd=0x4b44 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2651.759234][ T31] audit: type=1400 audit(2651.690:24011): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2651.764172][ T31] audit: type=1400 audit(2651.700:24012): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2651.768279][ T31] audit: type=1400 audit(2651.700:24013): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2651.769457][ T31] audit: type=1400 audit(2651.700:24014): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2651.770216][ T31] audit: type=1400 audit(2651.700:24015): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2652.204929][ T31] audit: type=1400 audit(2652.140:24016): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.221817][ T31] audit: type=1400 audit(2652.160:24017): avc: denied { recv } for pid=13831 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.225848][ T31] audit: type=1400 audit(2652.160:24018): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2652.227414][ T31] audit: type=1400 audit(2652.160:24019): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2652.483627][T14481] fuse: Invalid rootmode [ 2655.365379][T14496] fuse: Invalid rootmode [ 2657.052917][ T31] kauditd_printk_skb: 138 callbacks suppressed [ 2657.053031][ T31] audit: type=1400 audit(2656.990:24158): avc: denied { write } for pid=14497 comm="syz.0.2488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2657.068370][ T31] audit: type=1400 audit(2657.000:24159): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2657.069424][ T31] audit: type=1400 audit(2657.000:24160): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2657.070222][ T31] audit: type=1400 audit(2657.000:24161): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2657.075888][ T31] audit: type=1400 audit(2657.000:24162): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2657.077442][ T31] audit: type=1400 audit(2657.010:24163): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2657.097711][ T31] audit: type=1400 audit(2657.030:24164): avc: denied { ioctl } for pid=14502 comm="syz.1.2490" path="socket:[29704]" dev="sockfs" ino=29704 ioctlcmd=0x4b37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2657.558475][ T31] audit: type=1400 audit(2657.490:24165): avc: denied { ioctl } for pid=14497 comm="syz.0.2488" path="socket:[28716]" dev="sockfs" ino=28716 ioctlcmd=0x4b44 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2657.607315][T14510] FAULT_INJECTION: forcing a failure. [ 2657.607315][T14510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2657.608071][T14510] CPU: 0 UID: 0 PID: 14510 Comm: syz.1.2490 Not tainted 6.12.0-rc2-syzkaller #0 [ 2657.608459][T14510] Hardware name: ARM-Versatile Express [ 2657.608738][T14510] Call trace: [ 2657.608957][T14510] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2657.609443][T14510] r7:20000380 r6:eb3a9e30 r5:60000013 r4:8203d394 [ 2657.609750][T14510] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2657.610149][T14510] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2657.610545][T14510] r5:00000000 r4:8274e1c4 [ 2657.611019][T14510] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2657.611658][T14510] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 2657.612139][T14510] r6:eb3a9e30 r5:00000000 r4:eb3a9f38 [ 2657.612415][T14510] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 2657.612846][T14510] [<808e5324>] (should_fail_usercopy) from [<81486488>] (copy_msghdr_from_user+0x50/0x130) [ 2657.613384][T14510] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 2657.614319][T14510] r8:00000002 r7:00000000 r6:8328b180 r5:eb3a9f38 r4:eb3a9e74 [ 2657.614969][T14510] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 2657.615523][T14510] r10:00000128 r9:858a3c00 r8:8020029c r7:00000002 r6:20000380 r5:8328b180 [ 2657.615972][T14510] r4:00000000 [ 2657.616183][T14510] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2657.616601][T14510] Exception stack(0xeb3a9fa8 to 0xeb3a9ff0) [ 2657.616918][T14510] 9fa0: 00000000 00000000 00000004 20000380 00000002 00000000 [ 2657.617321][T14510] 9fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76aa30bc [ 2657.617734][T14510] 9fe0: 76aa2ec0 76aa2eb0 00018af8 00132ec0 [ 2657.618038][T14510] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 2657.627396][ T31] audit: type=1400 audit(2657.560:24166): avc: denied { write } for pid=14502 comm="syz.1.2490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2658.643474][ T31] audit: type=1400 audit(2658.580:24167): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2659.098267][T14522] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14522 comm=syz.0.2493 [ 2661.856406][T14552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14552 comm=syz.1.2503 [ 2662.062974][ T31] kauditd_printk_skb: 243 callbacks suppressed [ 2662.063025][ T31] audit: type=1400 audit(2661.990:24411): avc: denied { ioctl } for pid=14553 comm="syz.0.2504" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54e0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2662.069457][ T31] audit: type=1400 audit(2662.000:24412): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2662.077195][ T31] audit: type=1400 audit(2662.010:24413): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2662.077685][ T31] audit: type=1400 audit(2662.010:24414): avc: denied { create } for pid=14553 comm="syz.0.2504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2662.078576][ T31] audit: type=1400 audit(2662.010:24415): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2662.079841][ T31] audit: type=1400 audit(2662.010:24416): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2662.084441][ T31] audit: type=1400 audit(2662.020:24417): avc: denied { create } for pid=14553 comm="syz.0.2504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2662.084910][ T31] audit: type=1400 audit(2662.020:24418): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2662.085356][ T31] audit: type=1400 audit(2662.020:24419): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2662.087479][ T31] audit: type=1400 audit(2662.020:24420): avc: denied { ioctl } for pid=14553 comm="syz.0.2504" path="socket:[28795]" dev="sockfs" ino=28795 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2662.218815][T14566] FAULT_INJECTION: forcing a failure. [ 2662.218815][T14566] name failslab, interval 1, probability 0, space 0, times 0 [ 2662.219356][T14566] CPU: 0 UID: 0 PID: 14566 Comm: syz.1.2508 Not tainted 6.12.0-rc2-syzkaller #0 [ 2662.219648][T14566] Hardware name: ARM-Versatile Express [ 2662.219877][T14566] Call trace: [ 2662.220072][T14566] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2662.220406][T14566] r7:858a6000 r6:00000cc0 r5:60000013 r4:8203d394 [ 2662.220636][T14566] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2662.221088][T14566] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2662.221524][T14566] r5:00000000 r4:82718bdc [ 2662.221723][T14566] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2662.222139][T14566] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 2662.222481][T14566] r6:00000cc0 r5:eb5c5e38 r4:82ca8c00 [ 2662.222710][T14566] [<804e811c>] (should_failslab) from [<804ccef4>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 2662.223086][T14566] [<804ccea4>] (kmem_cache_alloc_lru_noprof) from [<80533f20>] (__d_alloc+0x30/0x228) [ 2662.223453][T14566] r10:00000000 r9:858a6000 r8:82237830 r7:8512d000 r6:eb5c5e38 r5:eb5c5e38 [ 2662.223828][T14566] r4:83294330 [ 2662.224025][T14566] [<80533ef0>] (__d_alloc) from [<80534130>] (d_alloc+0x18/0x68) [ 2662.224350][T14566] r9:858a6000 r8:02ea4133 r7:00000001 r6:eb5c5e38 r5:83294330 r4:83294330 [ 2662.224650][T14566] [<80534118>] (d_alloc) from [<80537518>] (d_alloc_parallel+0x58/0x494) [ 2662.225395][T14566] r7:00000001 r6:eb5c5e38 r5:83294330 r4:00000174 [ 2662.225650][T14566] [<805374c0>] (d_alloc_parallel) from [<805250f4>] (__lookup_slow+0x5c/0x134) [ 2662.226370][T14566] r10:00000000 r9:00000000 r8:856dc058 r7:00000001 r6:eb5c5e38 r5:83294330 [ 2662.226766][T14566] r4:83294330 [ 2662.226968][T14566] [<80525098>] (__lookup_slow) from [<80529204>] (walk_component+0x104/0x170) [ 2662.227355][T14566] r8:00000001 r7:00000001 r6:eb5c5e30 r5:856dc0d8 r4:83294330 [ 2662.227636][T14566] [<80529100>] (walk_component) from [<80529e8c>] (path_lookupat+0x7c/0x1a4) [ 2662.228035][T14566] r9:00000000 r8:eb5c5f24 r7:00000000 r6:00000001 r5:eb5c5f24 r4:eb5c5e30 [ 2662.228334][T14566] [<80529e10>] (path_lookupat) from [<8052a378>] (filename_lookup+0xc0/0x190) [ 2662.228676][T14566] r7:00000001 r6:851482c0 r5:858a6000 r4:ffffff9c [ 2662.228929][T14566] [<8052a2b8>] (filename_lookup) from [<8052a484>] (kern_path+0x3c/0x54) [ 2662.229271][T14566] r9:858a6000 r8:00000000 r7:00000083 r6:eb5c5f24 r5:00000001 r4:851482c0 [ 2662.229568][T14566] [<8052a448>] (kern_path) from [<807b52a4>] (lookup_bdev+0x50/0xc8) [ 2662.229898][T14566] r6:858a6000 r5:eb5c5f68 r4:851487c0 [ 2662.230129][T14566] [<807b5254>] (lookup_bdev) from [<805bb1e8>] (sys_quotactl+0x88/0x45c) [ 2662.230471][T14566] r6:858a6000 r5:00000000 r4:851487c0 [ 2662.230693][T14566] [<805bb160>] (sys_quotactl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2662.231720][T14566] Exception stack(0xeb5c5fa8 to 0xeb5c5ff0) [ 2662.232205][T14566] 5fa0: 00000000 00000000 00000000 20003240 00000000 00000000 [ 2662.232734][T14566] 5fc0: 00000000 00000000 00130e70 00000083 00000000 00006364 003d0f00 76b060bc [ 2662.233133][T14566] 5fe0: 76b05ec0 76b05eb0 00018af8 00132ec0 [ 2662.233392][T14566] r10:00000083 r9:858a6000 r8:8020029c r7:00000083 r6:00130e70 r5:00000000 [ 2662.233710][T14566] r4:00000000 [ 2663.611898][T14580] FAULT_INJECTION: forcing a failure. [ 2663.611898][T14580] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2663.612721][T14580] CPU: 1 UID: 0 PID: 14580 Comm: syz.0.2513 Not tainted 6.12.0-rc2-syzkaller #0 [ 2663.613396][T14580] Hardware name: ARM-Versatile Express [ 2663.613672][T14580] Call trace: [ 2663.613844][T14580] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2663.614183][T14580] r7:76b38e1c r6:0000000c r5:60000013 r4:8203d394 [ 2663.614390][T14580] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2663.614710][T14580] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2663.615078][T14580] r5:00000000 r4:8274e1c4 [ 2663.615282][T14580] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2663.615633][T14580] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 2663.616019][T14580] r6:0000000c r5:eb60dee4 r4:0000000c [ 2663.616243][T14580] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 2663.616598][T14580] [<808e5324>] (should_fail_usercopy) from [<814846f8>] (move_addr_to_kernel+0x3c/0xe4) [ 2663.616993][T14580] [<814846bc>] (move_addr_to_kernel) from [<81485ca8>] (__sys_sendto+0xc0/0x14c) [ 2663.617376][T14580] r9:841ce000 r8:00000003 r7:848fc280 r6:76b38e1c r5:00000000 r4:00000000 [ 2663.617693][T14580] [<81485be8>] (__sys_sendto) from [<81485d50>] (sys_sendto+0x1c/0x24) [ 2663.618059][T14580] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b38e1c [ 2663.618344][T14580] [<81485d34>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2663.618698][T14580] Exception stack(0xeb60dfa8 to 0xeb60dff0) [ 2663.618965][T14580] dfa0: 76b38e1c 0000000c 00000003 76b38eb0 00000024 00000000 [ 2663.619308][T14580] dfc0: 76b38e1c 0000000c 00000000 00000122 00000003 00000000 76b38eb0 76b3a0bc [ 2663.619653][T14580] dfe0: 00000000 76b38df0 000d8408 00135358 [ 2664.520215][T14594] FAULT_INJECTION: forcing a failure. [ 2664.520215][T14594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2664.522070][T14594] CPU: 0 UID: 0 PID: 14594 Comm: syz.0.2520 Not tainted 6.12.0-rc2-syzkaller #0 [ 2664.522539][T14594] Hardware name: ARM-Versatile Express [ 2664.522850][T14594] Call trace: [ 2664.523218][T14594] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2664.523875][T14594] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 2664.526308][T14594] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2664.526750][T14594] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2664.527125][T14594] r5:00000000 r4:8274e1c4 [ 2664.527350][T14594] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2664.527804][T14594] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 2664.528192][T14594] r6:00000000 r5:eb569f68 r4:00000002 [ 2664.528438][T14594] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 2664.528834][T14594] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 2664.529291][T14594] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 2664.529764][T14594] r10:00000001 r9:805c30ac r8:00000002 r7:eb569f68 r6:0000000f r5:76b39f30 [ 2664.530104][T14594] r4:858a4800 r3:eb569e9f [ 2664.530316][T14594] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 2664.530805][T14594] r8:76b39f30 r7:eb569f68 r6:858a4800 r5:0000000f r4:84544480 [ 2664.531358][T14594] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 2664.531897][T14594] r10:00000003 r9:858a4800 r8:8020029c r7:00000000 r6:00000000 r5:84544480 [ 2664.532248][T14594] r4:84544483 [ 2664.532434][T14594] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 2664.532813][T14594] r7:00000003 r6:00000004 r5:76b39f30 r4:0000000f [ 2664.533085][T14594] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2664.533472][T14594] Exception stack(0xeb569fa8 to 0xeb569ff0) [ 2664.533825][T14594] 9fa0: 0000000f 76b39f30 00000004 76b39f30 0000000f 00000000 [ 2664.534203][T14594] 9fc0: 0000000f 76b39f30 00000004 00000003 00000000 00006364 003d0f00 76b3a0bc [ 2664.534568][T14594] 9fe0: 00000158 76b39ed0 000d8408 00130d94 [ 2667.124550][ T31] kauditd_printk_skb: 263 callbacks suppressed [ 2667.124678][ T31] audit: type=1400 audit(2667.060:24684): avc: denied { mounton } for pid=14605 comm="syz.1.2525" path="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2667.127969][T14613] fuse: Bad value for 'fd' [ 2667.143834][ T31] audit: type=1400 audit(2667.070:24685): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2667.145460][ T31] audit: type=1400 audit(2667.080:24686): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2667.150006][ T31] audit: type=1400 audit(2667.080:24687): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2667.152063][ T31] audit: type=1400 audit(2667.080:24688): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2667.152947][ T31] audit: type=1400 audit(2667.080:24689): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2668.698672][ T31] audit: type=1400 audit(2668.630:24690): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2668.704992][ T31] audit: type=1400 audit(2668.640:24691): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2668.709753][ T31] audit: type=1400 audit(2668.640:24692): avc: denied { unmount } for pid=13831 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2668.722742][ T31] audit: type=1400 audit(2668.660:24693): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2672.157583][ T31] kauditd_printk_skb: 111 callbacks suppressed [ 2672.157648][ T31] audit: type=1400 audit(2672.090:24805): avc: denied { read } for pid=14638 comm="syz.0.2534" name="tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2672.160407][ T31] audit: type=1400 audit(2672.090:24806): avc: denied { read open } for pid=14638 comm="syz.0.2534" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2672.167068][ T31] audit: type=1400 audit(2672.100:24807): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2672.167983][ T31] audit: type=1400 audit(2672.100:24808): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2672.168666][ T31] audit: type=1400 audit(2672.100:24809): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2672.169462][ T31] audit: type=1400 audit(2672.100:24810): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2672.177519][ T31] audit: type=1400 audit(2672.110:24811): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2672.632198][ T31] audit: type=1400 audit(2672.570:24812): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.638317][ T31] audit: type=1400 audit(2672.570:24813): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2672.683507][ T31] audit: type=1400 audit(2672.620:24814): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2676.327977][T14654] FAULT_INJECTION: forcing a failure. [ 2676.327977][T14654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2676.328895][T14654] CPU: 1 UID: 0 PID: 14654 Comm: syz.1.2538 Not tainted 6.12.0-rc2-syzkaller #0 [ 2676.329266][T14654] Hardware name: ARM-Versatile Express [ 2676.329514][T14654] Call trace: [ 2676.329745][T14654] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2676.330155][T14654] r7:20000200 r6:eb931e30 r5:60000013 r4:8203d394 [ 2676.330426][T14654] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2676.331001][T14654] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2676.331704][T14654] r5:00000000 r4:8274e1c4 [ 2676.331989][T14654] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2676.332383][T14654] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 2676.332798][T14654] r6:eb931e30 r5:00000000 r4:eb931f38 [ 2676.333057][T14654] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 2676.333455][T14654] [<808e5324>] (should_fail_usercopy) from [<81486488>] (copy_msghdr_from_user+0x50/0x130) [ 2676.333933][T14654] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 2676.334358][T14654] r8:20000000 r7:00000000 r6:848f6500 r5:eb931f38 r4:eb931e74 [ 2676.334682][T14654] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 2676.335100][T14654] r10:00000128 r9:858a0000 r8:8020029c r7:20000000 r6:20000200 r5:848f6500 [ 2676.335460][T14654] r4:00000000 [ 2676.335656][T14654] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2676.336080][T14654] Exception stack(0xeb931fa8 to 0xeb931ff0) [ 2676.336385][T14654] 1fa0: 00000000 00000000 00000003 20000200 20000000 00000000 [ 2676.336780][T14654] 1fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b060bc [ 2676.337152][T14654] 1fe0: 76b05ec0 76b05eb0 00018af8 00132ec0 [ 2676.337442][T14654] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 2677.335477][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 2677.335574][ T31] audit: type=1400 audit(2677.270:24867): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.342896][ T31] audit: type=1400 audit(2677.280:24868): avc: denied { recv } for pid=13831 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.354606][ T31] audit: type=1400 audit(2677.290:24869): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2677.363584][ T31] audit: type=1400 audit(2677.300:24870): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2677.377574][ T31] audit: type=1400 audit(2677.310:24871): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2677.379115][ T31] audit: type=1400 audit(2677.310:24872): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2677.389548][ T31] audit: type=1400 audit(2677.320:24873): avc: denied { recv } for pid=2929 comm="syslogd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.390567][ T31] audit: type=1400 audit(2677.320:24874): avc: denied { recv } for pid=2929 comm="syslogd" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.392674][ T31] audit: type=1400 audit(2677.320:24875): avc: denied { recv } for pid=2929 comm="syslogd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2677.393455][ T31] audit: type=1400 audit(2677.320:24876): avc: denied { recv } for pid=31 comm="kauditd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2680.187851][T14678] FAULT_INJECTION: forcing a failure. [ 2680.187851][T14678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2680.188370][T14678] CPU: 0 UID: 0 PID: 14678 Comm: syz.0.2546 Not tainted 6.12.0-rc2-syzkaller #0 [ 2680.188647][T14678] Hardware name: ARM-Versatile Express [ 2680.188907][T14678] Call trace: [ 2680.189052][T14678] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2680.189503][T14678] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 2680.189775][T14678] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2680.190059][T14678] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2680.190356][T14678] r5:00000000 r4:8274e1c4 [ 2680.190527][T14678] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2680.191080][T14678] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 2680.191381][T14678] r6:00000000 r5:ebaadf68 r4:00000002 [ 2680.191500][T14678] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 2680.191682][T14678] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 2680.192071][T14678] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 2680.192281][T14678] r10:00000001 r9:805c30ac r8:00000002 r7:ebaadf68 r6:0000000f r5:76b39f30 [ 2680.192472][T14678] r4:841a2400 r3:ebaade9f [ 2680.192580][T14678] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 2680.192776][T14678] r8:76b39f30 r7:ebaadf68 r6:841a2400 r5:0000000f r4:8440b240 [ 2680.192923][T14678] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 2680.193106][T14678] r10:00000003 r9:841a2400 r8:8020029c r7:00000000 r6:00000000 r5:8440b240 [ 2680.193263][T14678] r4:8440b243 [ 2680.193341][T14678] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 2680.193512][T14678] r7:00000003 r6:00000005 r5:76b39f30 r4:0000000f [ 2680.193657][T14678] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2680.193843][T14678] Exception stack(0xebaadfa8 to 0xebaadff0) [ 2680.193984][T14678] dfa0: 0000000f 76b39f30 00000005 76b39f30 0000000f 00000000 [ 2680.194158][T14678] dfc0: 0000000f 76b39f30 00000005 00000003 00000000 00006364 003d0f00 76b3a0bc [ 2680.194393][T14678] dfe0: 00000158 76b39ed0 000d8408 00130d94 [ 2682.777728][ T31] kauditd_printk_skb: 238 callbacks suppressed [ 2682.777823][ T31] audit: type=1400 audit(2682.710:25113): avc: denied { ioctl } for pid=14702 comm="syz.0.2555" path="socket:[30059]" dev="sockfs" ino=30059 ioctlcmd=0x55c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2682.786488][ T31] audit: type=1400 audit(2682.720:25114): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2682.789069][ T31] audit: type=1400 audit(2682.720:25115): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2682.795568][ T31] audit: type=1400 audit(2682.730:25116): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2682.797400][ T31] audit: type=1400 audit(2682.730:25117): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2682.798472][ T31] audit: type=1400 audit(2682.730:25118): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2683.738033][ T31] audit: type=1400 audit(2683.670:25119): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2683.756503][ T31] audit: type=1400 audit(2683.690:25120): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2683.759507][ T31] audit: type=1400 audit(2683.690:25121): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2683.760360][ T31] audit: type=1400 audit(2683.690:25122): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2684.314331][T14716] fuse: Unknown parameter 'user_id00000000000000000000' [ 2684.432129][T14718] SELinux: Context { is not valid (left unmapped). [ 2684.435866][T14718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14718 comm=syz.0.2560 [ 2687.982108][ T31] kauditd_printk_skb: 145 callbacks suppressed [ 2687.982198][ T31] audit: type=1400 audit(2687.910:25268): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.983652][ T31] audit: type=1400 audit(2687.920:25269): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.988916][ T31] audit: type=1400 audit(2687.920:25270): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.995415][ T31] audit: type=1400 audit(2687.930:25271): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2687.996580][ T31] audit: type=1400 audit(2687.930:25272): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2688.003462][ T31] audit: type=1400 audit(2687.930:25273): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2688.004459][ T31] audit: type=1400 audit(2687.940:25274): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2688.013698][ T31] audit: type=1400 audit(2687.950:25275): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2688.014720][ T31] audit: type=1400 audit(2687.950:25276): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2688.036908][ T31] audit: type=1400 audit(2687.970:25277): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2691.923948][T14774] fuse: Bad value for 'fd' [ 2693.023391][ T31] kauditd_printk_skb: 101 callbacks suppressed [ 2693.023493][ T31] audit: type=1400 audit(2692.960:25379): avc: denied { ioctl } for pid=14775 comm="syz.0.2570" path="socket:[30131]" dev="sockfs" ino=30131 ioctlcmd=0x6434 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2693.035548][ T31] audit: type=1400 audit(2692.970:25380): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2693.038008][ T31] audit: type=1400 audit(2692.970:25381): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2693.041154][ T31] audit: type=1400 audit(2692.970:25382): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2693.042416][ T31] audit: type=1400 audit(2692.970:25383): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2693.043265][ T31] audit: type=1400 audit(2692.980:25384): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2693.526590][ T31] audit: type=1400 audit(2693.460:25385): avc: denied { ioctl } for pid=14775 comm="syz.0.2570" path="socket:[30131]" dev="sockfs" ino=30131 ioctlcmd=0x6435 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2693.535574][ T31] audit: type=1400 audit(2693.470:25386): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2693.537110][ T31] audit: type=1400 audit(2693.470:25387): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2693.537931][ T31] audit: type=1400 audit(2693.470:25388): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2698.034139][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 2698.034262][ T31] audit: type=1400 audit(2697.970:25465): avc: denied { mounton } for pid=14803 comm="syz.0.2575" path="/84/file0" dev="tmpfs" ino=459 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2698.048006][ T31] audit: type=1400 audit(2697.980:25466): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2698.050367][ T31] audit: type=1400 audit(2697.980:25468): avc: denied { mount } for pid=14803 comm="syz.0.2575" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2698.055509][ T31] audit: type=1400 audit(2697.980:25467): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2698.057450][ T31] audit: type=1400 audit(2697.990:25469): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2698.058220][ T31] audit: type=1400 audit(2697.990:25470): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2698.059182][ T31] audit: type=1400 audit(2697.990:25471): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2698.066752][ T31] audit: type=1400 audit(2698.000:25472): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2698.068264][ T31] audit: type=1400 audit(2698.000:25473): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2698.069144][ T31] audit: type=1400 audit(2698.000:25474): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2699.089320][T14811] fuse: Bad value for 'fd' [ 2700.144214][T14816] fuse: Unknown parameter 'fd0x0000000000000003' [ 2703.438975][ T31] kauditd_printk_skb: 89 callbacks suppressed [ 2703.439033][ T31] audit: type=1400 audit(2703.370:25564): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2703.448186][ T31] audit: type=1400 audit(2703.380:25565): avc: denied { recv } for pid=13831 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2703.452341][ T31] audit: type=1400 audit(2703.390:25566): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2703.453862][ T31] audit: type=1400 audit(2703.390:25567): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2703.460414][ T31] audit: type=1400 audit(2703.390:25568): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2703.465291][ T31] audit: type=1400 audit(2703.390:25569): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2703.466059][ T31] audit: type=1400 audit(2703.390:25570): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2703.484746][ T31] audit: type=1400 audit(2703.420:25571): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2703.488960][ T31] audit: type=1400 audit(2703.420:25572): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2703.490574][ T31] audit: type=1400 audit(2703.420:25573): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2705.001920][T14839] fuse: Unknown parameter 'fd0x0000000000000003' [ 2705.292954][T14846] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14846 comm=syz.0.2586 [ 2706.712855][T14857] fuse: Bad value for 'fd' [ 2707.292188][T11577] usb 1-1: new full-speed USB device number 26 using dummy_hcd [ 2707.448104][T11577] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2707.464478][T11577] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2707.464937][T11577] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2707.465179][T11577] usb 1-1: Product: syz [ 2707.465447][T11577] usb 1-1: Manufacturer: syz [ 2707.465755][T11577] usb 1-1: SerialNumber: syz [ 2707.486014][T11577] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -22 [ 2707.717295][T11569] usb 1-1: USB disconnect, device number 26 [ 2708.727148][ T31] kauditd_printk_skb: 236 callbacks suppressed [ 2708.727247][ T31] audit: type=1400 audit(2708.660:25810): avc: denied { read } for pid=14882 comm="syz.0.2594" name="ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2708.742001][ T31] audit: type=1400 audit(2708.660:25811): avc: denied { read open } for pid=14882 comm="syz.0.2594" path="/newroot/dev/ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2708.750200][ T31] audit: type=1400 audit(2708.680:25812): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2708.756539][ T31] audit: type=1400 audit(2708.680:25813): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2708.757622][ T31] audit: type=1400 audit(2708.690:25814): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2708.758343][ T31] audit: type=1400 audit(2708.690:25815): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2708.759000][ T31] audit: type=1400 audit(2708.690:25816): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2709.246922][ T31] audit: type=1400 audit(2709.180:25817): avc: denied { mounton } for pid=14882 comm="syz.0.2594" path="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2709.247020][T14886] fuse: Bad value for 'fd' [ 2709.258588][ T31] audit: type=1400 audit(2709.190:25818): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2709.260199][ T31] audit: type=1400 audit(2709.190:25819): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2711.127432][T14897] fuse: Bad value for 'fd' [ 2714.147150][T14923] fuse: Bad value for 'fd' [ 2714.147647][ T31] kauditd_printk_skb: 148 callbacks suppressed [ 2714.147812][ T31] audit: type=1400 audit(2714.080:25968): avc: denied { mounton } for pid=14920 comm="syz.0.2604" path="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2714.163070][ T31] audit: type=1400 audit(2714.100:25969): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2714.166938][ T31] audit: type=1400 audit(2714.100:25970): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2714.169236][ T31] audit: type=1400 audit(2714.100:25971): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2714.172536][ T31] audit: type=1400 audit(2714.100:25972): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2714.176504][ T31] audit: type=1400 audit(2714.110:25973): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2714.879079][ T31] audit: type=1400 audit(2714.810:25974): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2714.891980][ T31] audit: type=1400 audit(2714.820:25975): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2714.922738][ T31] audit: type=1400 audit(2714.860:25976): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2714.923595][ T31] audit: type=1400 audit(2714.860:25977): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2719.460057][ T31] kauditd_printk_skb: 126 callbacks suppressed [ 2719.460146][ T31] audit: type=1400 audit(2719.390:26104): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2719.473762][ T31] audit: type=1400 audit(2719.400:26105): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2719.481433][ T31] audit: type=1400 audit(2719.410:26106): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2719.483830][ T31] audit: type=1400 audit(2719.420:26107): avc: denied { unmount } for pid=13349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2719.485853][ T31] audit: type=1400 audit(2719.420:26108): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2719.487131][ T31] audit: type=1400 audit(2719.420:26109): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2719.487969][ T31] audit: type=1400 audit(2719.420:26110): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2719.488780][ T31] audit: type=1400 audit(2719.420:26111): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2719.505337][ T31] audit: type=1400 audit(2719.440:26112): avc: denied { recv } for pid=13579 comm="kworker/u10:1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2719.506249][ T31] audit: type=1400 audit(2719.440:26113): avc: denied { recv } for pid=13579 comm="kworker/u10:1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.079307][T14960] fuse: Bad value for 'fd' [ 2724.983175][ T31] kauditd_printk_skb: 165 callbacks suppressed [ 2724.983256][ T31] audit: type=1400 audit(2724.920:26279): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2724.990099][ T31] audit: type=1400 audit(2724.920:26280): avc: denied { unmount } for pid=13349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2724.993917][ T31] audit: type=1400 audit(2724.930:26281): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2724.998207][ T31] audit: type=1400 audit(2724.930:26282): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2725.001052][ T31] audit: type=1400 audit(2724.930:26283): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2725.001841][ T31] audit: type=1400 audit(2724.930:26284): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2725.005451][ T31] audit: type=1400 audit(2724.930:26285): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2725.006256][ T31] audit: type=1400 audit(2724.940:26286): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2725.043712][ T31] audit: type=1400 audit(2724.980:26287): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2725.044390][ T31] audit: type=1400 audit(2724.980:26288): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2730.465482][ T31] kauditd_printk_skb: 114 callbacks suppressed [ 2730.465547][ T31] audit: type=1400 audit(2730.400:26403): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2730.470591][ T31] audit: type=1400 audit(2730.400:26404): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2730.477767][ T31] audit: type=1400 audit(2730.410:26405): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2730.479639][ T31] audit: type=1400 audit(2730.410:26406): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2730.486882][ T31] audit: type=1400 audit(2730.420:26407): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2730.487433][ T31] audit: type=1400 audit(2730.420:26408): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2730.488051][ T31] audit: type=1400 audit(2730.420:26409): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2730.513544][ T31] audit: type=1400 audit(2730.450:26410): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2730.515311][ T31] audit: type=1400 audit(2730.450:26411): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2730.517333][ T31] audit: type=1400 audit(2730.450:26412): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2733.842628][T15064] fuse: Bad value for 'user_id' [ 2733.843059][T15064] fuse: Bad value for 'user_id' [ 2735.629711][ T31] kauditd_printk_skb: 190 callbacks suppressed [ 2735.629762][ T31] audit: type=1400 audit(2735.560:26603): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2735.638185][ T31] audit: type=1400 audit(2735.570:26604): avc: denied { recv } for pid=13349 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2735.649727][ T31] audit: type=1400 audit(2735.580:26605): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2735.657372][ T31] audit: type=1400 audit(2735.590:26606): avc: denied { unmount } for pid=13349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2735.658740][ T31] audit: type=1400 audit(2735.590:26607): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2735.663084][ T31] audit: type=1400 audit(2735.600:26608): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2735.664001][ T31] audit: type=1400 audit(2735.600:26609): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2735.664748][ T31] audit: type=1400 audit(2735.600:26610): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2735.683561][ T31] audit: type=1400 audit(2735.620:26611): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2735.684201][ T31] audit: type=1400 audit(2735.620:26612): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.713727][ T31] kauditd_printk_skb: 119 callbacks suppressed [ 2740.713786][ T31] audit: type=1400 audit(2740.650:26732): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.717409][ T31] audit: type=1400 audit(2740.650:26733): avc: denied { unmount } for pid=13349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2740.720537][ T31] audit: type=1400 audit(2740.650:26734): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.730236][ T31] audit: type=1400 audit(2740.660:26735): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2740.743552][ T31] audit: type=1400 audit(2740.680:26736): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2740.749686][ T31] audit: type=1400 audit(2740.680:26737): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2740.750614][ T31] audit: type=1400 audit(2740.680:26738): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2740.757149][ T31] audit: type=1400 audit(2740.680:26739): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2740.772853][ T31] audit: type=1400 audit(2740.710:26740): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.794599][ T31] audit: type=1400 audit(2740.710:26741): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2744.328507][T15133] FAULT_INJECTION: forcing a failure. [ 2744.328507][T15133] name failslab, interval 1, probability 0, space 0, times 0 [ 2744.333055][T15133] CPU: 1 UID: 0 PID: 15133 Comm: syz.1.2665 Not tainted 6.12.0-rc2-syzkaller #0 [ 2744.333573][T15133] Hardware name: ARM-Versatile Express [ 2744.333826][T15133] Call trace: [ 2744.334043][T15133] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2744.334483][T15133] r7:841a3000 r6:00000cc0 r5:60000013 r4:8203d394 [ 2744.334712][T15133] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2744.335052][T15133] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2744.335408][T15133] r5:00000000 r4:82718bdc [ 2744.335695][T15133] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2744.336074][T15133] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 2744.336430][T15133] r6:00000cc0 r5:200003c0 r4:82ca8b40 [ 2744.336922][T15133] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 2744.337287][T15133] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<80524f34>] (getname_flags.part.0+0x28/0x18c) [ 2744.337693][T15133] r10:000000e6 r9:841a3000 r8:20000400 r7:00000000 r6:8223783c r5:200003c0 [ 2744.338067][T15133] r4:200003c0 [ 2744.338219][T15133] [<80524f0c>] (getname_flags.part.0) from [<80529ff0>] (getname_flags+0x3c/0x50) [ 2744.338554][T15133] r9:841a3000 r8:20000400 r7:00000000 r6:ffffff9c r5:00000000 r4:200003c0 [ 2744.338830][T15133] [<80529fb4>] (getname_flags) from [<8052a558>] (user_path_at+0x2c/0x64) [ 2744.339344][T15133] r5:00000000 r4:ed7b9f5c [ 2744.339535][T15133] [<8052a52c>] (user_path_at) from [<8054cc10>] (path_getxattr+0x4c/0xc8) [ 2744.339888][T15133] r6:00000000 r5:200003c0 r4:00000000 [ 2744.340103][T15133] [<8054cbc4>] (path_getxattr) from [<8054cccc>] (sys_lgetxattr+0x1c/0x24) [ 2744.340565][T15133] r8:8020029c r7:000000e6 r6:00130e70 r5:00000000 r4:00000000 [ 2744.341152][T15133] [<8054ccb0>] (sys_lgetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2744.342056][T15133] Exception stack(0xed7b9fa8 to 0xed7b9ff0) [ 2744.342331][T15133] 9fa0: 00000000 00000000 200003c0 20000400 00000000 00000000 [ 2744.342693][T15133] 9fc0: 00000000 00000000 00130e70 000000e6 00000000 00006364 003d0f00 76b060bc [ 2744.343136][T15133] 9fe0: 76b05ec0 76b05eb0 00018af8 00132ec0 [ 2744.433442][T15137] fuse: Unknown parameter 'rootmodsXüL¯°^Ðã·Me' [ 2745.797605][ T31] kauditd_printk_skb: 165 callbacks suppressed [ 2745.797721][ T31] audit: type=1400 audit(2745.730:26907): avc: denied { write } for pid=15150 comm="syz.1.2670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2745.808853][ T31] audit: type=1400 audit(2745.740:26908): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2745.810209][ T31] audit: type=1400 audit(2745.740:26909): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2745.812435][ T31] audit: type=1400 audit(2745.740:26910): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2745.821524][ T31] audit: type=1400 audit(2745.740:26911): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2745.822448][ T31] audit: type=1400 audit(2745.750:26912): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2746.299642][ T31] audit: type=1400 audit(2746.230:26913): avc: denied { write } for pid=15150 comm="syz.1.2670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2746.307041][ T31] audit: type=1400 audit(2746.240:26914): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2746.309075][ T31] audit: type=1400 audit(2746.240:26915): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2746.309871][ T31] audit: type=1400 audit(2746.240:26916): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2747.638217][T15155] SELinux: Context system_u:object_r:getty_etc_t:s0 is not valid (left unmapped). [ 2750.835874][ T31] kauditd_printk_skb: 105 callbacks suppressed [ 2750.835970][ T31] audit: type=1400 audit(2750.770:27022): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2750.837207][ T31] audit: type=1400 audit(2750.770:27023): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2750.846997][ T31] audit: type=1400 audit(2750.770:27024): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2750.848723][ T31] audit: type=1400 audit(2750.780:27025): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2750.873803][ T31] audit: type=1400 audit(2750.790:27026): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2750.874892][ T31] audit: type=1400 audit(2750.790:27027): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2750.875636][ T31] audit: type=1400 audit(2750.800:27028): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2750.876336][ T31] audit: type=1400 audit(2750.800:27029): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2750.877051][ T31] audit: type=1400 audit(2750.800:27030): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2750.878415][ T31] audit: type=1400 audit(2750.800:27031): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2756.768848][ T31] kauditd_printk_skb: 257 callbacks suppressed [ 2756.768964][ T31] audit: type=1400 audit(2756.700:27289): avc: denied { create } for pid=15223 comm="syz.1.2692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2756.785553][ T31] audit: type=1400 audit(2756.710:27290): avc: denied { create } for pid=15223 comm="syz.1.2692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2756.786595][ T31] audit: type=1400 audit(2756.710:27291): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2756.792973][ T31] audit: type=1400 audit(2756.720:27292): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2756.794207][ T31] audit: type=1400 audit(2756.730:27293): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2756.795470][ T31] audit: type=1400 audit(2756.730:27294): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2756.796394][ T31] audit: type=1400 audit(2756.730:27295): avc: denied { write } for pid=15223 comm="syz.1.2692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2756.801282][ T31] audit: type=1400 audit(2756.730:27296): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2757.836142][ T31] audit: type=1400 audit(2757.760:27297): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2757.855233][ T31] audit: type=1400 audit(2757.790:27298): avc: denied { recv } for pid=13831 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2758.976967][T15252] fuse: Bad value for 'fd' [ 2761.827316][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 2761.827424][ T31] audit: type=1400 audit(2761.760:27417): avc: denied { create } for pid=15258 comm="syz.1.2699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2761.838478][ T31] audit: type=1400 audit(2761.770:27418): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2761.839315][ T31] audit: type=1400 audit(2761.770:27419): avc: denied { create } for pid=15258 comm="syz.1.2699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2761.839939][ T31] audit: type=1400 audit(2761.770:27420): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2761.846133][ T31] audit: type=1400 audit(2761.770:27421): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2761.847051][ T31] audit: type=1400 audit(2761.770:27422): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2761.850501][ T31] audit: type=1400 audit(2761.780:27423): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2761.858676][ T31] audit: type=1400 audit(2761.790:27424): avc: denied { write } for pid=15258 comm="syz.1.2699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2762.890060][T15275] fuse: Bad value for 'fd' [ 2762.891681][ T31] audit: type=1400 audit(2762.810:27425): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2762.892689][ T31] audit: type=1400 audit(2762.820:27426): avc: denied { mounton } for pid=15269 comm="syz.0.2702" path="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2767.085125][ T31] kauditd_printk_skb: 128 callbacks suppressed [ 2767.085223][ T31] audit: type=1400 audit(2767.020:27555): avc: denied { read } for pid=15302 comm="syz.0.2710" name="ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2767.138803][ T31] audit: type=1400 audit(2767.030:27556): avc: denied { open } for pid=15302 comm="syz.0.2710" path="/newroot/dev/ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2767.164387][ T31] audit: type=1400 audit(2767.090:27557): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2767.174774][ T31] audit: type=1400 audit(2767.090:27558): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2767.175891][ T31] audit: type=1400 audit(2767.090:27559): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2767.176679][ T31] audit: type=1400 audit(2767.090:27560): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2767.177673][ T31] audit: type=1400 audit(2767.090:27561): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2767.187910][ T31] audit: type=1400 audit(2767.120:27562): avc: denied { read } for pid=15305 comm="syz.1.2711" name="mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2767.189151][ T31] audit: type=1400 audit(2767.120:27563): avc: denied { open } for pid=15305 comm="syz.1.2711" path="/dev/mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2767.189996][ T31] audit: type=1400 audit(2767.120:27564): avc: denied { ioctl } for pid=15305 comm="syz.1.2711" path="/dev/mixer" dev="devtmpfs" ino=735 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2767.693158][T15306] fuse: Bad value for 'fd' [ 2770.017798][T15328] fuse: Bad value for 'fd' [ 2772.103290][ T31] kauditd_printk_skb: 197 callbacks suppressed [ 2772.103392][ T31] audit: type=1400 audit(2772.040:27762): avc: denied { create } for pid=15350 comm="syz.0.2723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2772.121412][ T31] audit: type=1400 audit(2772.050:27763): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2772.126020][ T31] audit: type=1400 audit(2772.060:27764): avc: denied { setopt } for pid=15350 comm="syz.0.2723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2772.134339][ T31] audit: type=1400 audit(2772.060:27765): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2772.134940][ T31] audit: type=1400 audit(2772.060:27766): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2772.135519][ T31] audit: type=1400 audit(2772.070:27767): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2772.136039][ T31] audit: type=1400 audit(2772.070:27768): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2772.139237][ T31] audit: type=1400 audit(2772.070:27769): avc: denied { connect } for pid=15350 comm="syz.0.2723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2772.254327][ T31] audit: type=1400 audit(2772.190:27770): avc: denied { read } for pid=15343 comm="syz.1.2721" name="ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2772.256898][ T31] audit: type=1400 audit(2772.190:27771): avc: denied { read open } for pid=15343 comm="syz.1.2721" path="/newroot/dev/ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2772.764824][T15352] fuse: Bad value for 'fd' [ 2773.373232][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2773.564916][T15365] FAULT_INJECTION: forcing a failure. [ 2773.564916][T15365] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.565672][T15365] CPU: 1 UID: 0 PID: 15365 Comm: syz.1.2727 Not tainted 6.12.0-rc2-syzkaller #0 [ 2773.566044][T15365] Hardware name: ARM-Versatile Express [ 2773.566246][T15365] Call trace: [ 2773.566445][T15365] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2773.566834][T15365] r7:841cec00 r6:00000cc0 r5:60000013 r4:8203d394 [ 2773.567073][T15365] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2773.567414][T15365] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2773.567796][T15365] r5:00000000 r4:82718bdc [ 2773.567989][T15365] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2773.568312][T15365] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 2773.568652][T15365] r6:00000cc0 r5:ffffffff r4:82cac780 [ 2773.568870][T15365] [<804e811c>] (should_failslab) from [<804ccbbc>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 2773.569244][T15365] [<804ccb6c>] (kmem_cache_alloc_node_noprof) from [<81490f00>] (__alloc_skb+0x138/0x160) [ 2773.569630][T15365] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cac780 r5:ffffffff [ 2773.569929][T15365] r4:82606000 [ 2773.570093][T15365] [<81490dc8>] (__alloc_skb) from [<815a63bc>] (netlink_alloc_large_skb+0x88/0xa0) [ 2773.570448][T15365] r8:00000000 r7:852bd800 r6:0000001c r5:83258000 r4:00000140 [ 2773.571720][T15365] [<815a6334>] (netlink_alloc_large_skb) from [<815a69c4>] (netlink_sendmsg+0x134/0x43c) [ 2773.572171][T15365] r5:83258000 r4:dfb3de98 [ 2773.572382][T15365] [<815a6890>] (netlink_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 2773.573301][T15365] r10:00000122 r9:841cec00 r8:00000003 r7:83258000 r6:83258000 r5:dfb3de98 [ 2773.573769][T15365] r4:00000000 [ 2773.574120][T15365] [<81483654>] (__sock_sendmsg) from [<81485cf0>] (__sys_sendto+0x108/0x14c) [ 2773.574698][T15365] r7:83258000 r6:76b04e1c r5:00000000 r4:00000000 [ 2773.575024][T15365] [<81485be8>] (__sys_sendto) from [<81485d50>] (sys_sendto+0x1c/0x24) [ 2773.575588][T15365] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b04e1c [ 2773.575966][T15365] [<81485d34>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2773.576799][T15365] Exception stack(0xdfb3dfa8 to 0xdfb3dff0) [ 2773.577339][T15365] dfa0: 76b04e1c 0000000c 00000003 76b04eb0 0000001c 00000000 [ 2773.577712][T15365] dfc0: 76b04e1c 0000000c 00000000 00000122 00000003 00000000 76b04eb0 76b060bc [ 2773.578066][T15365] dfe0: 00000000 76b04df0 000d8408 00135358 [ 2775.284771][T15373] fuse: Bad value for 'fd' [ 2777.400512][ T31] kauditd_printk_skb: 200 callbacks suppressed [ 2777.400738][ T31] audit: type=1400 audit(2777.330:27972): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2777.414013][ T31] audit: type=1400 audit(2777.340:27973): avc: denied { recv } for pid=13831 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2777.424869][ T31] audit: type=1400 audit(2777.360:27974): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2777.431826][ T31] audit: type=1400 audit(2777.360:27975): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2777.432883][ T31] audit: type=1400 audit(2777.360:27976): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2777.436285][ T31] audit: type=1400 audit(2777.360:27977): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2777.436918][ T31] audit: type=1400 audit(2777.360:27978): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2777.447832][ T31] audit: type=1400 audit(2777.380:27979): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2777.448943][ T31] audit: type=1400 audit(2777.380:27980): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2777.449525][ T31] audit: type=1400 audit(2777.380:27981): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2779.077154][T15415] fuse: Bad value for 'fd' [ 2780.575232][T15419] fuse: Bad value for 'fd' [ 2782.442026][ T31] kauditd_printk_skb: 87 callbacks suppressed [ 2782.442366][ T31] audit: type=1400 audit(2782.370:28069): avc: denied { write } for pid=15429 comm="syz.1.2743" path="socket:[31214]" dev="sockfs" ino=31214 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2782.445431][ T31] audit: type=1400 audit(2782.380:28070): avc: denied { write } for pid=15429 comm="syz.1.2743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2782.460425][ T31] audit: type=1400 audit(2782.390:28071): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2782.462025][ T31] audit: type=1400 audit(2782.390:28072): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2782.463574][ T31] audit: type=1400 audit(2782.400:28073): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2782.464308][ T31] audit: type=1400 audit(2782.400:28074): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2782.464928][ T31] audit: type=1400 audit(2782.400:28075): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2782.469854][ T31] audit: type=1400 audit(2782.400:28076): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2782.481585][ T31] audit: type=1400 audit(2782.410:28077): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2782.483661][ T31] audit: type=1400 audit(2782.410:28078): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2786.176043][T15450] fuse: Bad value for 'fd' [ 2788.117263][ T31] kauditd_printk_skb: 103 callbacks suppressed [ 2788.117340][ T31] audit: type=1400 audit(2788.040:28182): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2788.118550][ T31] audit: type=1400 audit(2788.050:28183): avc: denied { recv } for pid=13831 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2788.124658][ T31] audit: type=1400 audit(2788.060:28184): avc: denied { unmount } for pid=13831 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2788.131761][ T31] audit: type=1400 audit(2788.060:28185): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2788.134045][ T31] audit: type=1400 audit(2788.070:28186): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2788.140521][ T31] audit: type=1400 audit(2788.070:28187): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2788.142710][ T31] audit: type=1400 audit(2788.070:28188): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2788.143530][ T31] audit: type=1400 audit(2788.070:28189): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2788.153443][ T31] audit: type=1400 audit(2788.090:28190): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2788.154136][ T31] audit: type=1400 audit(2788.090:28191): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2788.628722][T15463] 8021q: VLANs not supported on ipvlan0 [ 2790.728961][T15486] FAULT_INJECTION: forcing a failure. [ 2790.728961][T15486] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2790.729805][T15486] CPU: 0 UID: 0 PID: 15486 Comm: syz.1.2758 Not tainted 6.12.0-rc2-syzkaller #0 [ 2790.730317][T15486] Hardware name: ARM-Versatile Express [ 2790.731021][T15486] Call trace: [ 2790.731425][T15486] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2790.731896][T15486] r7:20000200 r6:dffbde30 r5:60000013 r4:8203d394 [ 2790.732217][T15486] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 2790.732605][T15486] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2790.732997][T15486] r5:00000000 r4:8274e1c4 [ 2790.733213][T15486] [<819b738c>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 2790.733591][T15486] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 2790.734017][T15486] r6:dffbde30 r5:00000000 r4:dffbdf38 [ 2790.734269][T15486] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 2790.734668][T15486] [<808e5324>] (should_fail_usercopy) from [<81486488>] (copy_msghdr_from_user+0x50/0x130) [ 2790.735115][T15486] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 2790.735549][T15486] r8:20000000 r7:00000000 r6:8325e780 r5:dffbdf38 r4:dffbde74 [ 2790.735904][T15486] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 2790.736609][T15486] r10:00000128 r9:841a1800 r8:8020029c r7:20000000 r6:20000200 r5:8325e780 [ 2790.737182][T15486] r4:00000000 [ 2790.737404][T15486] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2790.737812][T15486] Exception stack(0xdffbdfa8 to 0xdffbdff0) [ 2790.738137][T15486] dfa0: 00000000 00000000 00000003 20000200 20000000 00000000 [ 2790.738523][T15486] dfc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b060bc [ 2790.738913][T15486] dfe0: 76b05ec0 76b05eb0 00018af8 00132ec0 [ 2790.739204][T15486] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 2792.050186][T15493] fuse: Bad value for 'fd' [ 2794.508288][ T31] kauditd_printk_skb: 183 callbacks suppressed [ 2794.508389][ T31] audit: type=1400 audit(2794.440:28375): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.525038][ T31] audit: type=1400 audit(2794.460:28376): avc: denied { recv } for pid=13831 comm="syz-executor" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.526397][ T31] audit: type=1400 audit(2794.460:28377): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2794.531279][ T31] audit: type=1400 audit(2794.460:28378): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2794.541184][ T31] audit: type=1400 audit(2794.460:28379): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2794.541929][ T31] audit: type=1400 audit(2794.460:28380): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2794.542497][ T31] audit: type=1400 audit(2794.460:28381): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2794.554675][ T31] audit: type=1400 audit(2794.490:28382): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.556684][ T31] audit: type=1400 audit(2794.490:28383): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.557552][ T31] audit: type=1400 audit(2794.490:28384): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2795.132528][T15512] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=25 sclass=netlink_audit_socket pid=15512 comm=syz.0.2766 [ 2796.826507][T15521] fuse: Bad value for 'fd' [ 2800.049820][ T31] kauditd_printk_skb: 221 callbacks suppressed [ 2800.049932][ T31] audit: type=1400 audit(2799.980:28606): avc: denied { write } for pid=15548 comm="syz.1.2777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2800.057285][ T31] audit: type=1400 audit(2799.990:28607): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2800.064273][ T31] audit: type=1400 audit(2800.000:28608): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2800.065270][ T31] audit: type=1400 audit(2800.000:28609): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2800.066028][ T31] audit: type=1400 audit(2800.000:28610): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2800.066755][ T31] audit: type=1400 audit(2800.000:28611): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2800.067495][ T31] audit: type=1400 audit(2800.000:28612): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2800.068266][ T31] audit: type=1400 audit(2800.000:28613): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2800.069097][ T31] audit: type=1400 audit(2800.000:28614): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2800.069856][ T31] audit: type=1400 audit(2800.000:28615): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2800.107929][T15555] fuse: Bad value for 'fd' [ 2802.442080][T15577] nbd: must specify an index to disconnect [ 2803.415963][T15582] fuse: Bad value for 'fd' [ 2805.433898][ T31] kauditd_printk_skb: 169 callbacks suppressed [ 2805.434004][ T31] audit: type=1400 audit(2805.370:28785): avc: denied { prog_load } for pid=15592 comm="syz.1.2789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2805.434885][ T31] audit: type=1400 audit(2805.370:28786): avc: denied { bpf } for pid=15592 comm="syz.1.2789" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2805.435675][ T31] audit: type=1400 audit(2805.370:28787): avc: denied { perfmon } for pid=15592 comm="syz.1.2789" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2805.451614][ T31] audit: type=1400 audit(2805.370:28788): avc: denied { prog_run } for pid=15592 comm="syz.1.2789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2805.530280][ T31] audit: type=1400 audit(2805.460:28789): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2805.532062][ T31] audit: type=1400 audit(2805.460:28790): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2805.532654][ T31] audit: type=1400 audit(2805.460:28791): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2805.534113][ T31] audit: type=1400 audit(2805.460:28792): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2805.534736][ T31] audit: type=1400 audit(2805.460:28793): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2805.561338][ T31] audit: type=1400 audit(2805.470:28794): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2810.449678][ T31] kauditd_printk_skb: 168 callbacks suppressed [ 2810.449797][ T31] audit: type=1400 audit(2810.380:28963): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2810.452043][ T31] audit: type=1400 audit(2810.380:28964): avc: denied { prog_run } for pid=15632 comm="syz.0.2801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2810.484350][ T31] audit: type=1400 audit(2810.410:28965): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2810.484893][ T31] audit: type=1400 audit(2810.420:28966): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2810.486520][ T31] audit: type=1400 audit(2810.420:28967): avc: denied { recv } for pid=31 comm="kauditd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2810.492243][ T31] audit: type=1400 audit(2810.430:28968): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2810.494856][ T31] audit: type=1400 audit(2810.430:28969): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2810.495343][ T31] audit: type=1400 audit(2810.430:28970): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2810.495847][ T31] audit: type=1400 audit(2810.430:28971): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2810.496324][ T31] audit: type=1400 audit(2810.430:28972): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2815.466502][ T31] kauditd_printk_skb: 215 callbacks suppressed [ 2815.466610][ T31] audit: type=1400 audit(2815.400:29188): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2815.468641][ T31] audit: type=1400 audit(2815.400:29189): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2815.495112][ T31] audit: type=1400 audit(2815.430:29190): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2815.496294][ T31] audit: type=1400 audit(2815.430:29191): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2815.516767][ T31] audit: type=1400 audit(2815.430:29192): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2815.517989][ T31] audit: type=1400 audit(2815.430:29193): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2815.581354][ T31] audit: type=1400 audit(2815.430:29194): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2815.808766][ T31] audit: type=1400 audit(2815.710:29195): avc: denied { create } for pid=15690 comm="syz.1.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2815.817434][ T31] audit: type=1400 audit(2815.750:29196): avc: denied { write } for pid=15690 comm="syz.1.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2815.858106][ T31] audit: type=1400 audit(2815.790:29197): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2820.495048][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 2820.495116][ T31] audit: type=1400 audit(2820.430:29271): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2820.511660][ T31] audit: type=1400 audit(2820.430:29272): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2820.512584][ T31] audit: type=1400 audit(2820.430:29273): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2820.522877][ T31] audit: type=1400 audit(2820.460:29274): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2820.528173][ T31] audit: type=1400 audit(2820.460:29275): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2820.528906][ T31] audit: type=1400 audit(2820.460:29276): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2820.541966][ T31] audit: type=1400 audit(2820.460:29277): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2820.542740][ T31] audit: type=1400 audit(2820.460:29278): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2820.566820][ T31] audit: type=1400 audit(2820.500:29279): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2820.567579][ T31] audit: type=1400 audit(2820.500:29280): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2821.367678][T15737] dvmrp0: entered allmulticast mode [ 2821.378863][T15737] dvmrp0: left allmulticast mode [ 2825.659068][ T31] kauditd_printk_skb: 146 callbacks suppressed [ 2825.660608][ T31] audit: type=1400 audit(2825.590:29427): avc: denied { sys_module } for pid=15761 comm="syz.1.2837" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2825.692667][ T31] audit: type=1400 audit(2825.590:29428): avc: denied { module_request } for pid=15761 comm="syz.1.2837" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2825.701630][ T31] audit: type=1400 audit(2825.630:29429): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2825.704716][ T31] audit: type=1400 audit(2825.640:29430): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2825.726787][ T31] audit: type=1400 audit(2825.650:29431): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2825.738613][ T31] audit: type=1400 audit(2825.650:29432): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2825.745610][ T31] audit: type=1400 audit(2825.650:29433): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2825.819134][ T31] audit: type=1400 audit(2825.750:29434): avc: denied { write } for pid=15761 comm="syz.1.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2825.928366][ T31] audit: type=1400 audit(2825.860:29435): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.937354][ T31] audit: type=1400 audit(2825.870:29436): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.682626][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 2830.682808][ T31] audit: type=1400 audit(2830.620:29471): avc: denied { execute } for pid=15777 comm="syz.1.2840" path="/228/blkio.bfq.avg_queue_size" dev="tmpfs" ino=1234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2830.704697][ T31] audit: type=1400 audit(2830.640:29472): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2830.707684][ T31] audit: type=1400 audit(2830.640:29473): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2830.708216][ T31] audit: type=1400 audit(2830.640:29474): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2830.709028][ T31] audit: type=1400 audit(2830.640:29475): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2830.709719][ T31] audit: type=1400 audit(2830.640:29476): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2831.097977][ T31] audit: type=1400 audit(2831.030:29477): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2831.106987][ T31] audit: type=1400 audit(2831.040:29478): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2831.118628][ T31] audit: type=1400 audit(2831.050:29479): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2831.122025][ T31] audit: type=1400 audit(2831.060:29480): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2835.253406][T15640] usb 2-1: new full-speed USB device number 24 using dummy_hcd [ 2835.416706][T15640] usb 2-1: config index 0 descriptor too short (expected 156, got 27) [ 2835.417042][T15640] usb 2-1: too many endpoints for config 0 interface 0 altsetting 191: 144, using maximum allowed: 30 [ 2835.417337][T15640] usb 2-1: config 0 interface 0 altsetting 191 endpoint 0x87 has an invalid bInterval 0, changing to 10 [ 2835.417575][T15640] usb 2-1: config 0 interface 0 altsetting 191 endpoint 0x87 has invalid maxpacket 255, setting to 64 [ 2835.417813][T15640] usb 2-1: config 0 interface 0 altsetting 191 has 1 endpoint descriptor, different from the interface descriptor's value: 144 [ 2835.418089][T15640] usb 2-1: config 0 interface 0 has no altsetting 0 [ 2835.464196][T15640] usb 2-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice=86.66 [ 2835.464684][T15640] usb 2-1: New USB device strings: Mfr=85, Product=120, SerialNumber=172 [ 2835.465023][T15640] usb 2-1: Product: syz [ 2835.465230][T15640] usb 2-1: Manufacturer: syz [ 2835.465433][T15640] usb 2-1: SerialNumber: syz [ 2835.476689][T15640] usb 2-1: config 0 descriptor?? [ 2835.515635][T15808] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2835.535148][T15640] ldusb 2-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 2835.555709][T15640] ldusb 2-1:0.0: LD USB Device #0 now attached to major 180 minor 0 [ 2835.809278][ T31] kauditd_printk_skb: 132 callbacks suppressed [ 2835.809343][ T31] audit: type=1400 audit(2835.740:29613): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.817394][ T31] audit: type=1400 audit(2835.750:29614): avc: denied { recv } for pid=15800 comm="syz.0.2848" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.853184][ T31] audit: type=1400 audit(2835.790:29615): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.862014][ T31] audit: type=1400 audit(2835.790:29616): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.862967][ T31] audit: type=1400 audit(2835.790:29617): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.863589][ T31] audit: type=1400 audit(2835.790:29618): avc: denied { recv } for pid=3107 comm="sshd" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.870350][ T31] audit: type=1400 audit(2835.800:29619): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.876041][ T31] audit: type=1400 audit(2835.810:29620): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2835.934288][ T31] audit: type=1400 audit(2835.870:29621): avc: denied { read write } for pid=15828 comm="syz.1.2850" name="nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2835.935085][ T31] audit: type=1400 audit(2835.870:29622): avc: denied { open } for pid=15828 comm="syz.1.2850" path="/dev/nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2837.244996][T15835] binder: 15834:15835 ioctl c0306201 20000240 returned -22 [ 2837.330338][T15652] usb 2-1: USB disconnect, device number 24 [ 2837.346335][T15652] ldusb 2-1:0.0: LD USB Device #0 now disconnected [ 2840.873831][ T31] kauditd_printk_skb: 188 callbacks suppressed [ 2840.873944][ T31] audit: type=1400 audit(2840.810:29811): avc: denied { sys_module } for pid=15863 comm="syz.1.2861" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2840.875191][ T31] audit: type=1400 audit(2840.810:29812): avc: denied { module_request } for pid=15863 comm="syz.1.2861" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2840.890039][ T31] audit: type=1400 audit(2840.820:29813): avc: denied { execute } for pid=15867 comm="syz.0.2862" path="/206/cpu.stat" dev="tmpfs" ino=1122 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2840.895561][ T31] audit: type=1400 audit(2840.830:29814): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2840.914606][ T31] audit: type=1400 audit(2840.830:29815): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2840.915658][ T31] audit: type=1400 audit(2840.850:29816): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2840.916506][ T31] audit: type=1400 audit(2840.850:29817): avc: denied { append open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2840.917225][ T31] audit: type=1400 audit(2840.850:29818): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2841.087219][ T31] audit: type=1400 audit(2841.020:29819): avc: denied { write } for pid=15863 comm="syz.1.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2841.107615][ T31] audit: type=1400 audit(2841.040:29820): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2849.183671][ T31] kauditd_printk_skb: 119 callbacks suppressed [ 2849.183836][ T31] audit: type=1400 audit(2849.110:29940): avc: denied { create } for pid=15891 comm="syz.0.2871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2849.189055][ T31] audit: type=1400 audit(2849.120:29941): avc: denied { read } for pid=15891 comm="syz.0.2871" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2849.189809][ T31] audit: type=1400 audit(2849.120:29942): avc: denied { open } for pid=15891 comm="syz.0.2871" path="/dev/ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2849.227879][ T31] audit: type=1400 audit(2849.160:29943): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2849.231110][ T31] audit: type=1400 audit(2849.160:29944): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2849.247104][ T31] audit: type=1400 audit(2849.180:29945): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2849.248177][ T31] audit: type=1400 audit(2849.180:29946): avc: denied { open } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2849.249127][ T31] audit: type=1400 audit(2849.180:29947): avc: denied { getattr } for pid=2929 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2849.271438][ T31] audit: type=1400 audit(2849.200:29948): avc: denied { ioctl } for pid=15891 comm="syz.0.2871" path="/dev/ptmx" dev="devtmpfs" ino=605 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2849.272647][ T31] audit: type=1400 audit(2849.200:29949): avc: denied { ioctl } for pid=15891 comm="syz.0.2871" path="/dev/ptmx" dev="devtmpfs" ino=605 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2854.501357][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 2854.501427][ T31] audit: type=1400 audit(2854.430:30002): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2854.503303][ T31] audit: type=1400 audit(2854.430:30003): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2854.507372][ T31] audit: type=1400 audit(2854.430:30004): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2854.532320][ T31] audit: type=1400 audit(2854.430:30005): avc: denied { recv } for pid=3109 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2854.532932][ T31] audit: type=1400 audit(2854.440:30006): avc: denied { recv } for pid=15640 comm="kworker/0:4" saddr=10.0.2.2 src=39156 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2854.537542][ T31] audit: type=1400 audit(2854.470:30007): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35096 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2854.538133][ T31] audit: type=1400 audit(2854.470:30008): avc: denied { recv } for pid=3107 comm="sshd" saddr=127.0.0.1 src=35096 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2854.551430][ T31] audit: type=1400 audit(2854.480:30009): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2854.606209][ T31] audit: type=1400 audit(2854.520:30010): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2854.616497][ T31] audit: type=1400 audit(2854.550:30011): avc: denied { append } for pid=2929 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2854.774449][T15907] netlink: 'syz.1.2877': attribute type 3 has an invalid length. [ 2854.774991][T15907] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2877'. [ 2859.823460][ T31] kauditd_printk_skb: 55 callbacks suppressed [ 2859.823575][ T31] audit: type=1400 audit(2859.760:30067): avc: denied { ioctl } for pid=15916 comm="syz.1.2881" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=32807 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2859.828397][T15917] ------------[ cut here ]------------ [ 2859.829034][T15917] WARNING: CPU: 0 PID: 15917 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 2859.829537][T15917] Modules linked in: [ 2859.834335][T15917] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2859.835093][T15917] CPU: 0 UID: 0 PID: 15917 Comm: syz.1.2881 Not tainted 6.12.0-rc2-syzkaller #0 [ 2859.835463][T15917] Hardware name: ARM-Versatile Express [ 2859.835764][T15917] Call trace: [ 2859.835994][T15917] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 2859.836724][T15917] r7:00000000 r6:826228c4 r5:00000000 r4:8203d394 [ 2859.837283][T15917] [<81998ebc>] (show_stack) from [<819b7364>] (dump_stack_lvl+0x54/0x7c) [ 2859.838239][T15917] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 2859.838614][T15917] r5:00000000 r4:82870d18 [ 2859.838852][T15917] [<819b738c>] (dump_stack) from [<81999a00>] (panic+0x120/0x374) [ 2859.839201][T15917] [<819998e0>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 2859.839565][T15917] r3:8260c5c4 r2:00000001 r1:82025774 r0:8202d1dc [ 2859.839893][T15917] r7:8048c614 [ 2859.840083][T15917] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 2859.840456][T15917] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 2859.841322][T15917] r8:00000009 r7:82054dd8 r6:dfcadd24 r5:846f3000 r4:00000000 [ 2859.841641][T15917] [<80242350>] (warn_slowpath_fmt) from [<8048c614>] (kunmap_local_indexed+0x20c/0x224) [ 2859.842092][T15917] r10:ffefd0a8 r9:83f02700 r8:20508000 r7:fffffffe r6:00000003 r5:846f3000 [ 2859.842440][T15917] r4:ffefd000 [ 2859.842623][T15917] [<8048c408>] (kunmap_local_indexed) from [<80505a48>] (move_pages+0x7e8/0x149c) [ 2859.843068][T15917] r7:fffffffe r6:00000000 r5:84ed2810 r4:ffefb840 [ 2859.843347][T15917] [<80505260>] (move_pages) from [<80581c70>] (userfaultfd_ioctl+0x114c/0x2080) [ 2859.843852][T15917] r10:83f02700 r9:dfcade98 r8:00000001 r7:20c16000 r6:00000000 r5:20000080 [ 2859.844199][T15917] r4:85218000 [ 2859.844395][T15917] [<80580b24>] (userfaultfd_ioctl) from [<8052f654>] (sys_ioctl+0x134/0xda8) [ 2859.844820][T15917] r10:846f3000 r9:85795e40 r8:00000003 r7:20000080 r6:85795e41 r5:00000000 [ 2859.845155][T15917] r4:c028aa05 [ 2859.845465][T15917] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2859.845875][T15917] Exception stack(0xdfcadfa8 to 0xdfcadff0) [ 2859.846162][T15917] dfa0: 00000000 00000000 00000003 c028aa05 20000080 00000000 [ 2859.846569][T15917] dfc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76b060bc [ 2859.846976][T15917] dfe0: 76b05ec0 76b05eb0 00018af8 00132ec0 [ 2859.847283][T15917] r10:00000036 r9:846f3000 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 2859.848068][T15917] r4:00000000 [ 2859.849970][T15917] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:00:35 Registers: info registers vcpu 0 CPU#0 R00=83e16540 R01=00000400 R02=00000001 R03=dfa1d400 R04=83e16540 R05=83417400 R06=83dc1000 R07=00000000 R08=83dc1680 R09=83d67400 R10=00000000 R11=df801644 R12=df801630 R13=df801630 R14=80988358 R15=80988360 PSR=60000113 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=76b060bc R12=20000490 R13=20000490 R14=00018b94 R15=00018b94 PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000